Rule Library

Sigma Rules

351 rules found for "initial-access"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionhightest

Users Added to Global or Device Admin Roles

Monitor and alert for users added to device admin roles.

Azureauditlogs
TA0003 · PersistenceTA0001 · Initial AccessTA0005 · Defense EvasionTA0004 · Privilege Escalation+1
Michael EppingTue Jun 28cloud
Detectionhightest

Application AppID Uri Configuration Changes

Detects when a configuration change is made to an applications AppID URI.

Azureauditlogs
TA0001 · Initial AccessTA0005 · Defense EvasionTA0003 · PersistenceTA0006 · Credential Access+3
Mark Morowczynski+1Thu Jun 02cloud
Detectionhightest

Application URI Configuration Changes

Detects when a configuration change is made to an applications URI. URIs for domain names that no longer exist (dangling URIs), not using HTTPS, wildcards at the end of the domain, URIs that are no unique to that app, or URIs that point to domains you do not control should be investigated.

Azureauditlogs
TA0001 · Initial AccessTA0005 · Defense EvasionT1528 · Steal Application Access TokenT1078.004 · Cloud Accounts+3
Mark Morowczynski+1Thu Jun 02cloud
Detectionmediumtest

Azure Domain Federation Settings Modified

Identifies when an user or application modified the federation settings on the domain.

Azureauditlogs
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionTA0001 · Initial Access+1
Austin SongerMon Sep 06cloud
Detectionmediumtest

Guest User Invited By Non Approved Inviters

Detects when a user that doesn't have permissions to invite a guest user attempts to invite one.

Azureauditlogs
TA0004 · Privilege EscalationTA0001 · Initial AccessTA0003 · PersistenceTA0005 · Defense Evasion+1
Mark Morowczynski+1Wed Aug 10cloud
Detectionmediumtest

User State Changed From Guest To Member

Detects the change of user type from "Guest" to "Member" for potential elevation of privilege.

Azureauditlogs
TA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege EscalationTA0001 · Initial Access+1
Mike DuddingtonThu Jun 30cloud
Detectionhightest

PIM Approvals And Deny Elevation

Detects when a PIM elevation is approved or denied. Outside of normal operations should be investigated.

Azureauditlogs
TA0003 · PersistenceTA0001 · Initial AccessTA0005 · Defense EvasionTA0004 · Privilege Escalation+1
Mark Morowczynski+1Tue Aug 09cloud
Detectionhightest

PIM Alert Setting Changes To Disabled

Detects when PIM alerts are set to disabled.

Azureauditlogs
TA0001 · Initial AccessTA0005 · Defense EvasionTA0003 · PersistenceTA0004 · Privilege Escalation+1
Mark Morowczynski+1Tue Aug 09cloud
Detectionhightest

Changes To PIM Settings

Detects when changes are made to PIM roles

Azureauditlogs
TA0001 · Initial AccessTA0005 · Defense EvasionTA0004 · Privilege EscalationTA0003 · Persistence+1
Mark Morowczynski+1Tue Aug 09cloud
Detectionhightest

User Added To Privilege Role

Detects when a user is added to a privileged role.

Azureauditlogs
TA0003 · PersistenceTA0001 · Initial AccessTA0004 · Privilege EscalationTA0005 · Defense Evasion+1
Mark Morowczynski+1Sat Aug 06cloud
Detectionmediumtest

Privileged Account Creation

Detects when a new admin is created.

Azureauditlogs
TA0001 · Initial AccessTA0005 · Defense EvasionTA0003 · PersistenceTA0004 · Privilege Escalation+1
Mark Morowczynski+2Thu Aug 11cloud
Detectionhightest

Azure Subscription Permission Elevation Via AuditLogs

Detects when a user has been elevated to manage all Azure Subscriptions. This change should be investigated immediately if it isn't planned. This setting could allow an attacker access to Azure subscriptions in your environment.

Azureauditlogs
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionTA0001 · Initial Access+1
Austin SongerFri Nov 26cloud
Detectionhightest

Temporary Access Pass Added To An Account

Detects when a temporary access pass (TAP) is added to an account. TAPs added to priv accounts should be investigated

Azureauditlogs
TA0004 · Privilege EscalationTA0001 · Initial AccessTA0005 · Defense EvasionTA0003 · Persistence+1
Mark Morowczynski+1Wed Aug 10cloud
Detectionmediumtest

Password Reset By User Account

Detect when a user has reset their password in Azure AD

Azureauditlogs
TA0004 · Privilege EscalationTA0001 · Initial AccessTA0005 · Defense EvasionTA0003 · Persistence+2
YochanaHendersonWed Aug 03cloud
Detectionhightest

Activity From Anonymous IP Address

Identifies that users were active from an IP address that has been identified as an anonymous proxy IP address.

Azureriskdetection
T1078 · Valid AccountsTA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege Escalation+1
Mark Morowczynski+1Sun Sep 03cloud
Detectionhightest

Atypical Travel

Identifies two sign-ins originating from geographically distant locations, where at least one of the locations may also be atypical for the user, given past behavior.

Azureriskdetection
T1078 · Valid AccountsTA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege Escalation+1
Mark Morowczynski+1Sun Sep 03cloud
Detectionhightest

Impossible Travel

Identifies user activities originating from geographically distant locations within a time period shorter than the time it takes to travel from the first location to the second.

Azureriskdetection
T1078 · Valid AccountsTA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege Escalation+1
Mark Morowczynski+1Sun Sep 03cloud
Detectionhightest

New Country

Detects sign-ins from new countries. The detection considers past activity locations to determine new and infrequent locations.

Azureriskdetection
T1078 · Valid AccountsTA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege Escalation+1
Mark Morowczynski+1Sun Sep 03cloud
Detectionhightest

Suspicious Browser Activity

Indicates anomalous behavior based on suspicious sign-in activity across multiple tenants from different countries in the same browser

Azureriskdetection
T1078 · Valid AccountsTA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege Escalation+1
Mark Morowczynski+1Sun Sep 03cloud
Detectionhightest

Azure AD Threat Intelligence

Indicates user activity that is unusual for the user or consistent with known attack patterns.

Azureriskdetection
T1078 · Valid AccountsTA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege Escalation+1
Mark Morowczynski+1Thu Sep 07cloud
Detectionhightest

Unfamiliar Sign-In Properties

Detects sign-in with properties that are unfamiliar to the user. The detection considers past sign-in history to look for anomalous sign-ins.

Azureriskdetection
T1078 · Valid AccountsTA0003 · PersistenceTA0005 · Defense EvasionTA0004 · Privilege Escalation+1
Mark Morowczynski+1Sun Sep 03cloud
Detectionhightest

Stale Accounts In A Privileged Role

Identifies when an account hasn't signed in during the past n number of days.

Azurepim
TA0001 · Initial AccessTA0005 · Defense EvasionT1078 · Valid AccountsTA0003 · Persistence+1
Mark Morowczynski+1Thu Sep 14cloud
Detectionhightest

Invalid PIM License

Identifies when an organization doesn't have the proper license for PIM and is out of compliance.

Azurepim
TA0001 · Initial AccessTA0005 · Defense EvasionT1078 · Valid AccountsTA0003 · Persistence+1
Mark Morowczynski+1Thu Sep 14cloud
Detectionhightest

Roles Assigned Outside PIM

Identifies when a privilege role assignment has taken place outside of PIM and may indicate an attack.

Azurepim
TA0001 · Initial AccessTA0005 · Defense EvasionT1078 · Valid AccountsTA0003 · Persistence+1
Mark Morowczynski+1Thu Sep 14cloud
Detectionhightest

Roles Activated Too Frequently

Identifies when the same privilege role has multiple activations by the same user.

Azurepim
TA0001 · Initial AccessTA0005 · Defense EvasionT1078 · Valid AccountsTA0003 · Persistence+1
Mark Morowczynski+1Thu Sep 14cloud
Detectionhightest

Roles Are Not Being Used

Identifies when a user has been assigned a privilege role and are not using that role.

Azurepim
TA0001 · Initial AccessTA0005 · Defense EvasionT1078 · Valid AccountsTA0003 · Persistence+1
Mark Morowczynski+1Thu Sep 14cloud
Detectionhightest

Roles Activation Doesn't Require MFA

Identifies when a privilege role can be activated without performing mfa.

Azurepim
TA0001 · Initial AccessTA0005 · Defense EvasionT1078 · Valid AccountsTA0003 · Persistence+1
Mark Morowczynski+1Thu Sep 14cloud
Detectionhightest

Too Many Global Admins

Identifies an event where there are there are too many accounts assigned the Global Administrator role.

Azurepim
TA0001 · Initial AccessTA0005 · Defense EvasionT1078 · Valid AccountsTA0003 · Persistence+1
Mark Morowczynski+1Thu Sep 14cloud
Detectionmediumtest

Successful Authentications From Countries You Do Not Operate Out Of

Detect successful authentications from countries you do not operate out of.

Azuresigninlogs
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionTA0001 · Initial Access+3
Mike DuddingtonThu Jul 28cloud
Detectionmediumtest

Increased Failed Authentications Of Any Type

Detects when sign-ins increased by 10% or greater.

Azuresigninlogs
TA0004 · Privilege EscalationTA0003 · PersistenceTA0001 · Initial AccessTA0005 · Defense Evasion+1
Mark Morowczynski+1Thu Aug 11cloud
Detectionlowtest

Measurable Increase Of Successful Authentications

Detects when successful sign-ins increased by 10% or greater.

Azuresigninlogs
TA0004 · Privilege EscalationTA0003 · PersistenceTA0001 · Initial AccessTA0005 · Defense Evasion+1
Mark Morowczynski+2Thu Aug 11cloud
Detectionmediumtest

Authentications To Important Apps Using Single Factor Authentication

Detect when authentications to important application(s) only required single-factor authentication

Azuresigninlogs
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionTA0001 · Initial Access+1
Mike DuddingtonThu Jul 28cloud
Detectionmediumtest

Device Registration or Join Without MFA

Monitor and alert for device registration or join events where MFA was not performed.

Azuresigninlogs
TA0004 · Privilege EscalationTA0003 · PersistenceTA0001 · Initial AccessTA0005 · Defense Evasion+1
Michael EppingTue Jun 28cloud
Detectionlowtest

Failed Authentications From Countries You Do Not Operate Out Of

Detect failed authentications from countries you do not operate out of.

Azuresigninlogs
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionTA0001 · Initial Access+3
Mike DuddingtonThu Jul 28cloud
Detectionlowtest

Azure AD Only Single Factor Authentication Required

Detect when users are authenticating without MFA being required.

Azuresigninlogs
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionTA0001 · Initial Access+3
Mike DuddingtonWed Jul 27cloud
Detectionhightest

Suspicious SignIns From A Non Registered Device

Detects risky authentication from a non AD registered device without MFA being required.

Azuresigninlogs
TA0004 · Privilege EscalationTA0003 · PersistenceTA0001 · Initial AccessTA0005 · Defense Evasion+1
Harjot SinghTue Jan 10cloud
Detectionhightest

Sign-ins from Non-Compliant Devices

Monitor and alert for sign-ins where the device was non-compliant.

Azuresigninlogs
TA0004 · Privilege EscalationTA0003 · PersistenceTA0001 · Initial AccessTA0005 · Defense Evasion+1
Michael EppingTue Jun 28cloud
Detectionlowtest

Sign-ins by Unknown Devices

Monitor and alert for Sign-ins by unknown devices from non-Trusted locations.

Azuresigninlogs
TA0004 · Privilege EscalationTA0003 · PersistenceTA0001 · Initial AccessTA0005 · Defense Evasion+1
Michael EppingTue Jun 28cloud
Detectionhightest

Potential MFA Bypass Using Legacy Client Authentication

Detects successful authentication from potential clients using legacy authentication via user agent strings. This could be a sign of MFA bypass using a password spray attack.

Azuresigninlogs
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionTA0001 · Initial Access+3
Harjot SinghMon Mar 20cloud
Detectionmediumtest

Application Using Device Code Authentication Flow

Device code flow is an OAuth 2.0 protocol flow specifically for input constrained devices and is not used in all environments. If this type of flow is seen in the environment and not being used in an input constrained device scenario, further investigation is warranted. This can be a misconfigured application or potentially something malicious.

Azuresigninlogs
T1078 · Valid AccountsTA0005 · Defense EvasionTA0003 · PersistenceTA0004 · Privilege Escalation+1
Mark Morowczynski+1Wed Jun 01cloud
Detectionmediumtest

Applications That Are Using ROPC Authentication Flow

Resource owner password credentials (ROPC) should be avoided if at all possible as this requires the user to expose their current password credentials to the application directly. The application then uses those credentials to authenticate the user against the identity provider.

Azuresigninlogs
T1078 · Valid AccountsTA0005 · Defense EvasionTA0003 · PersistenceTA0004 · Privilege Escalation+1
Mark Morowczynski+1Wed Jun 01cloud
Detectionmediumtest

Account Disabled or Blocked for Sign in Attempts

Detects when an account is disabled or blocked for sign in but tried to log in

Azuresigninlogs
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionTA0001 · Initial Access+1
Yochana HendersonFri Jun 17cloud
Detectionhightest

Sign-in Failure Due to Conditional Access Requirements Not Met

Define a baseline threshold for failed sign-ins due to Conditional Access failures

Azuresigninlogs
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionTA0001 · Initial Access+3
Yochana HendersonWed Jun 01cloud
Detectionhightest

Use of Legacy Authentication Protocols

Alert on when legacy authentication has been used on an account

Azuresigninlogs
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionTA0001 · Initial Access+3
Yochana HendersonFri Jun 17cloud
Detectionmediumtest

Login to Disabled Account

Detect failed attempts to sign in to disabled accounts.

Azuresigninlogs
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionTA0001 · Initial Access+1
AlertIQSun Oct 10cloud
Detectionmediumtest

Multifactor Authentication Denied

User has indicated they haven't instigated the MFA prompt and could indicate an attacker has the password for the account.

Azuresigninlogs
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionTA0001 · Initial Access+4
AlertIQThu Mar 24cloud
Detectionmediumtest

Multifactor Authentication Interrupted

Identifies user login with multifactor authentication failures, which might be an indication an attacker has the password for the account but can't pass the MFA challenge.

Azuresigninlogs
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionTA0001 · Initial Access+4
AlertIQSun Oct 10cloud
Detectionmediumtest

Azure Unusual Authentication Interruption

Detects when there is a interruption in the authentication process.

Azuresigninlogs
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionTA0001 · Initial Access+1
Austin SongerFri Nov 26cloud